Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

45 results about "Self certified" patented technology

Self-Certification (New York City Department of Buildings) Jump to navigation Jump to search. Self-Certification, officially known as Professional Certification, is a process by which licensed professionals may bypass a full review of a building project by the New York City Department of Buildings.

Two-party key agreement method based on self-certified public key

The invention discloses a two-party key agreement method based on a self-certified public key, mainly solving the complicated certificate management problem in the traditional PKI technology to realize the self-certified two-party key share and reduce the network resource expenses. The method comprises the following steps of: allocating shared keys to n virtual central nodes by utilizing a threshold cryptology; selecting an individual secret random number by one party of a session, calculating public parameters, sending the individual identity and the public parameters to a virtual center to apply an individual self-certified public key; selecting an individual secret random number by the other one party of the session, calculating public parameters, sending the individual identity and the public parameters to the virtual center to apply an individual self-certified public key; after mutually exchanging the self-certified public key, the identity and the public parameters by two parties of the session, respectively calculating the shared session key. In the invention, a light code ECC is used as a theoretical basis without the certificate management, the key escrow and the safe signal path, so that the man-in-the-middle attack can be resisted, and the invention is suitable for the mobile self-organization network safety communication with the limited resources.
Owner:XIDIAN UNIV

Routing method, routing device, packet forwarding method and packet forwarding system

ActiveCN102546419ASmall scaleImprove packet forwarding efficiencyData switching networksSelf certifiedBorder Gateway Protocol
The invention provides a routing method, a routing device, a packet forwarding method and a packet forwarding system and relates to the technical field of routing. The routing method comprises the following steps of: establishing a two-stage routing structure on the basis of end responsibility domains and transmission responsibility domains, wherein an edge network is formed by integration of the end responsibility domains and a core network is formed by integration of the transmission responsibility domains; among the transmission responsibility domains, establishing a routing table which takes transmission responsibility domain labels as handles on the basis of an improved BGP (Border Gateway Protocol), replacing an IP (Internet Protocol) prefix and an AS (Autonomous System) number in the BGP with the transmission responsibility domain labels for the improved BGP and not reserving the aggregate attribute in the BGP; and between the end responsibility domains and the transmission responsibility domains, establishing a mapping relation between the end responsibility domains and access routers of the end responsibility domains in the transmission responsibility domains. In the invention, the scheme is adopted to greatly reduce the scale of the routing table and provide the excellent routing expandability when supporting the domain labels with the self-certifying characteristics. Moreover, in the packet forwarding process, due to the small scale of the routing table, the packet forwarding efficiency is greatly improved.
Owner:北京地平线轨道技术有限公司

Face recognition identity self-certifying method and system

The invention discloses a face recognition identity self-certifying method. The face recognition identity self-certifying method comprises the following steps: (a) acquiring first face information bya mobile terminal, and generating a first face feature template and a first face feature code; (b) acquiring first fingerprint information by the mobile terminal, and generating a first fingerprint feature template and a first fingerprint feature code; (c) transmitting the template, the information and a first private key to a cloud platform server by the mobile terminal, and associating the template, the information and the first private key with user archival information; (d) displaying an instruction of an identity authentication request on the mobile terminal; (e) acquiring second face information and second fingerprint information by the mobile terminal to generate a second face feature temperature, a second fingerprint feature template, a second face feature code and a second fingerprint feature code, and transmitting the templates, the information and a second private key to the cloud platform server; (f) comparing the first private key to the second private key by the cloud platform server; and (g) when comparison is successful, outputting an identity legal message.
Owner:上海亦源智能科技有限公司

Cross-cluster asymmetric group key negotiation method in wireless sensor network

The invention provides a cross-cluster asymmetric group key negotiation method in a wireless sensor network. The method comprises steps as follows: an allied and shared key between clusters is established, cluster heads are taken as bridging nodes, and sensor nodes of different nodes have the same group key factor information; an asymmetric computation algorithm is designed in the group key negotiation process, more computation and communication traffic of the sensor nodes are migrated to the cluster head nodes with larger energy, and the lightweight property of computation and communication overhead of the sensor nodes is ensured; self-certification property of keys is realized, additional communication rounds are not required, the sensor nodes can self-certify the correctness in computing the group keys, and the correctness and the safety of the group key negotiation are guaranteed. Group key negotiation of the sensor nodes distributed in different clusters in the wireless sensor network is realized, a safe communication channel is established, the scale of cooperative computation and information sharing of sensor node groups is further expanded, energy consumption of the sensor nodes is reduced, and the service life of the sensor nodes is prolonged.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Self-certified root implementation method based on open source DNS software

The invention discloses a self-certified root implementation method based on open source DNS software, and relates to the technical field of DNS security improvement. The invention aims to solve the problem that the root area glue record is tampered due to the fact that a signature mechanism for the root area glue record is not provided in an existing DNSSEC scheme. The method comprises the following steps: generating a regional key and a signature of the regional key to a glue record in a root server and a top-level domain server; and releasing the top-level domain key and the glue record signature thereof to a root server to replace the original glue record of the root region, and querying the top-level domain glue record from the root server on a recursive analyzer and carrying out DNSSEC verification. According to the self-certified root scheme, potential safety hazards that glue records in a DNSSEC scheme may be tampered are improved, and the safety of the glue records in the rootregion is improved by adding signatures of the glue records in the root region. By modifying the source code of the open source DNS software, a trust chain of glue recording from the root domain to the top domain is established in the root region, and self-certification of the root is achieved.
Owner:HARBIN INST OF TECH

Dual-recognition recognition device based on entrance guard card and face recognition

The invention discloses a dual-affirmation recognition device based on an entrance guard card and face recognition. The invention belongs to the technical field of access control, the identity authentication authority main bodies can be innovatively interchanged; the resident performs mastering and identity authentication by himself / herself; face recognition is integrated on an existing access control card. When identity authentication is carried out, the access control card carries out information collection and information comparison. Therefore, the self-authentication of the resident is completed; personal information interaction between residents and the access control system is avoided; only after the authentication is passed, the access control card sends an authentication passing signal to the access control system; the privacy and the safety of personal information of residents can be greatly improved; certain guarantee is provided for residents in the information era of data explosion. Meanwhile, humanistic care is fully shown, identity authentication rights are given to the residents, contradiction between property management and the residents can be effectively avoided,the harmony degree of a community is increased, great convenience can be provided for life, and high popularization value is achieved.
Owner:江西拓世智能科技股份有限公司

Generation and authentication method of self-certified public key of mobile self-organized network

The invention discloses a management method of self-certified public key of a mobile self-organized network on the basis of ECC, comprising the following steps: a shared key is distributed to n virtual central nodes by threshold cryptology; a user chooses a secret random number to calculate a public parameter, and identity and the public parameter are sent to a nearby virtual central node A1; A1 contacts with other virtual central nodes and sends the user information to the nodes; each publisher Ai chooses a random secret integer and calculates as well as broadcasts a self-certified public key subblock Qi to other publishers according to the secret integers and parameters published by the user; each publisher Ai calculates a self-certified public key Q, a sub-signature xi and an intermediate quantity Ri and sends (r, I, xi and Ri) to a synthesizer; the synthesizer calculates and synthesizes a signature x after all sub-signatures are qualified after authentication and sends Q and x to the user; the user calculates a secret key s according to the x; and the authenticity of the self-certified public key of the user is verified. The invention has no certificate management, no key escrow and no secure channel, so that the invention is suitable for the safe communication of the mobile self-organization network with limited resource.
Owner:XIDIAN UNIV

Subway comprehensive monitoring system based on SM3 and SM4 communication encryption

The invention relates to a subway comprehensive monitoring system based on SM3 and SM4 communication encryption, and belongs to the technical field of subway monitoring. The system comprises a key management center and a plurality of monitoring centers. The monitoring centers are connected through an integrated monitoring system backbone network. Each monitoring center comprises a workstation, anFEP and a server which are connected through a network bus. The workstation, the FEP and the server are respectively provided with a workstation end UKey, an FEP end UKey and a server end UKey; and the workstation, the FEP and the server are all provided with security middleware modules. When the monitoring program needs to be started each time; self-authentication of equipment is carried out through a workstation, FEP, a UKey corresponding to a server and a security middleware module, meanwhile, a server side needs to be authenticated by a user for an operator, a corresponding monitoring program can be started only after the authentication is passed, and then key agreement and data encryption communication are carried out. According to the invention, illegal invasion can be effectively avoided, and the safety of the subway integrated monitoring system is improved.
Owner:郑州地铁集团有限公司 +1

Cross-cluster asymmetric group key agreement method in wireless sensor networks

The invention provides a cross-cluster asymmetric group key negotiation method in a wireless sensor network. The method comprises steps as follows: an allied and shared key between clusters is established, cluster heads are taken as bridging nodes, and sensor nodes of different nodes have the same group key factor information; an asymmetric computation algorithm is designed in the group key negotiation process, more computation and communication traffic of the sensor nodes are migrated to the cluster head nodes with larger energy, and the lightweight property of computation and communication overhead of the sensor nodes is ensured; self-certification property of keys is realized, additional communication rounds are not required, the sensor nodes can self-certify the correctness in computing the group keys, and the correctness and the safety of the group key negotiation are guaranteed. Group key negotiation of the sensor nodes distributed in different clusters in the wireless sensor network is realized, a safe communication channel is established, the scale of cooperative computation and information sharing of sensor node groups is further expanded, energy consumption of the sensor nodes is reduced, and the service life of the sensor nodes is prolonged.
Owner:河南招源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products